Организаторы

В сотрудничестве

CTCRYPT 2017

Фотогалерея

Программа

Wednesday 3.06

11.30-13.00 Free time
13.00-14.00 Lunch
14.00-14.30 Registration
14.30-14.40 Opening remarks
14.40-18.05 Mathematical problems of cryptography I
14.40-15.10 Andrey Bogdanov. Towards Post-Snowden Cryptography
15.10-15.40 Yury Kharin. Parsimonious models of high-order Markov chains for evaluation of cryptographic generators
15.40-16.00 N.A. Kolomeec. A graph of minimal distances of bent functions
16.00-16.20 V.G. Mihailov, A.V. Volgin. Solutions set stability of pseudo-Boolean equations system in a case of their random distortions
16.20-16.40 Coffee break
16.40-17.10 Sergey Agievich, Anastasia Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia Tokareva, Valeriya Vitkup. Mathematical problems of the First international student's Olympiad in cryptography NSUCRYPTO
17.10-17.30 A.Yu. Nesterenko. Some remarks on elliptic curve discrete logarithm problem
17.30-17.50 K. Zhukov. Approximate common divisor problem and continued fractions
17.50-18.05 A.R. Gaynullina, S.N.Tronin. On Operad-based Cryptography

 

Thursday 4.06

10.00-11.50 Mathematical problems of cryptography II (Session in memory of Alexander Nechaev)
10.00-10.30 Alexey Kuzmin. Alexander Nechaev's mathematical heritage
10.30-10.50 S.N. Zaitsev. Reconstruction of a skew non-reducible MP LRS over Galois ring of characteristic 2d by a highest digit
10.50-11.10 M.A. Goltvanitsa. The first digit sequence of a skew linear recurrence of a maximal period over Galois ring
11.10-11.30 V.N. Tsypyshev. Second coordinate sequence of the MP-LRS over non-trivial Galois ring of  odd characteristic
11.30-11.50 S. Kuzmin. On binary digit-position sequences over Galois rings, admitting twofold reduction of a period
11.50-12.10 Coffee break
12.10-13.55 Quantum cryptography and technologies
12.10-12.40 Farid Ablayev, Marat Ablayev. On the concept of quantum hashing
12.40-13.00 M. Kaplan. Quantum attacks against iterated block ciphers
13.00-13.20 I.V. Radchenko, K.S. Kravtsov, S.P. Kulik. Quantum random number generator
13.20-13.40 A. Vasiliev, M. Ziatdinov. Minimizing collisions for quantum hashing
13.40-13.55 M. Ziatdinov. Quantum hashing based on symmetric groups
13.55-15.00 Lunch
15.00-16.00 Cryptanalysis and implementation I
15.00-15.15 N. P. Borisenko, V. L. Nguyen. On an implementation method of a large size linear transformation
15.15-15.30 P.A. Lebedev.   Unifying development and implementation of secure network protocols in C++
15.30-15.45 A.V. Trepacheva.  A known plaintext attack on a fully homomorphic cryptosistem based on factorization
15.45-16.00 G. Sekar. Side channel cryptanalysis of Streebog
16.00-16.20 Coffee break
16.20-18.00 Rump-session

 

Дискуссионная панель
«День открытых дверей ТК26»
(15.00–18.00)

 

Формат дискуссионной панели: выступление спикера 15 мин. + 15 мин. обсуждение темы с аудиторией.

Вопросы к обсуждению:

  • Новый образ ТК26. Текущие проекты. Перспективы развития.

Спикер – Чапчаев А.А., Генеральный директор ОАО  «ИнфоТеКС»

  • О разработке требований к СКЗИ
Спикер – Маршалко Г.Б., представитель ТК 26
  • Международная стандартизация: вчера, сегодня, завтра
Спикер – Уривский А.В., представитель ТК 26
  • О построении функционально законченных СКЗИ с использованием решений ТК 26

Спикер – Смышляев С.В., ООО «КРИПТО-ПРО»
  • Расширенный контроль доступа
Спикер – Мелузов А.С., ФГУП НИИ «Восход»

 

Friday 5.06

10.00-11.35 Cryptographic mechanisms
10.00-10.30 Markku-Yuhani Olavi Saarinen, Developments with CAESAR authenticated encryption competition
10.30-10.50 S.V. Polikarpov, K.E. Rumyantsev, A.A. Kozhevnikov. On differential properties of a symmetric crypto algorithm based on pseudo-dynamic substitutions
10.50-11.05 E.K. Alekseev, V.D. Nikolaev, I.B. Oshkin, V.O. Popov, A.S. Prokhorov, S.V. Smyshlyaev, L.A. Soninа. On a secure connection establishment protocol for a functional key carrier
11.05-11.20 S.N.Tronin, K.A.Petukhova. RSA-like cryptosystem using Dedekind rings
11.20-11.35 Ph. B. Burtyka. Additively homomorphic encryption using matrix polynomials with approximate perfect security
11.35-11.55 Coffee break
11.55-13.15 Cryptanalysis and implementation II
11.55-12.15 S. Grebnev. Optimizing memory cost of multi-scalar multiplication
12.15-12.35 D. Fomin. A timing attack on CUDA implementations of an AES-type block cipher
12.35-12.55 R. AlTawy, O. Duman,  A.M. Youssef. Fault Analysis of Kuznyechik
12.55-13.15 D.A. Burov, B.A. Pogorelov. Attack on 6 rounds of  KHAZAD
13.15-14.00 Check-out (for participants leaving for Moscow)
14.00-15.00 Lunch (for “Mirage” hotel guests)

Партнеры

Генеральный партнер
Партнер

Организационная поддержка

При поддержке

Инфопартнеры